Congratulations, the screenshot showed that you've just passed the Internet Operator Competency Assessment Test of China, Level 1 (Learner, China in 2005). To obtain higher levels of certification, study the the following subjects:
Level 2 (Beginner, China in 2007): Upgrading all deployed network protocols to encrypted versions, not only TCP but DNS and TLS SNI. If no encrypted version is available, use heuristic filters to ignore spoofed results.
Level 3 (Technician, China in 2010): Implement an original tunneling protocol resistant to keyword Sniffing, TCP reset attacks, and active probing.
Level 4 (Professional, China in 2013): Design an anti-traffic policer to maintain high throughput under intentional QoS and packet loss. Assess its effectiveness for China Telecom, China Unicom to Hong Kong, Korea, Japan, Singapore, USA, and Russia.
Level 5 (Engineer, China in 2015): Run multi-city network congestion monitoring servers via ping and routreroute. Learn the topology of domestic and international network backbone using self-study materials of mixed quality, identify key ISPs with good peering and transit relationships using BGP Looking Glass.
Level 6 (Expert, 2000-2024, always ongoing): Develop an original exploit to disrupt or de-synchronize stateful firewalls, such as manipulating packet fragmentation bit, spoofing SYN, ACK, FIN, allowing the Great Firewall of China to ignore your traffic completely.
By completing these certifications, you would be able to surf the Internet and looking at GitHub source code and American cat pictures with confidence.
Conversation
Notices
-
Embed this notice
niconiconi (niconiconi@mk.absturztau.be)'s status on Saturday, 26-Oct-2024 02:21:26 JST niconiconi - Haelwenn /элвэн/ :triskell: likes this.
-
Embed this notice
Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Saturday, 26-Oct-2024 02:24:04 JST Haelwenn /элвэн/ :triskell: @niconiconi Also could see gentoo users just slightly tweaking their wireguard implementation to bypass the firewalls. -
Embed this notice
niconiconi (niconiconi@mk.absturztau.be)'s status on Saturday, 26-Oct-2024 02:30:07 JST niconiconi @lanodan@queer.hacktivis.me If I recall correctly, one Level 6 tool was a custom kernel module in the netfilter chain...
Haelwenn /элвэн/ :triskell: likes this.